Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A bgv-type multi-key fully homomorphic encryption method

A fully homomorphic encryption and homomorphic encryption technology, which is applied in the fields of information security and privacy protection, can solve the problems of large public parameters and large amount of computation in the process of calculating keys, and reduce the amount of data, size and quantity, and size Effect

Active Publication Date: 2022-04-15
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The BGV-type MKFHE scheme has the disadvantages of large amount of ciphertext, relatively large public parameters, and a large amount of computation in the process of generating and calculating keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A bgv-type multi-key fully homomorphic encryption method
  • A bgv-type multi-key fully homomorphic encryption method
  • A bgv-type multi-key fully homomorphic encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be described in further detail below in conjunction with specific examples, but the embodiments of the present invention are not limited thereto.

[0049] This embodiment provides an efficient BGV-type multi-key fully homomorphic encryption method, which uses ciphertext expansion technology to convert single-user ciphertext into multi-user ciphertext, thereby converting a multi-key fully homomorphic encryption scheme It is a single-key fully homomorphic encryption scheme, and uses key transformation technology and mold change technology to process ciphertext and reduce the dimension and noise of ciphertext. The BGV-type multi-key fully homomorphic encryption method can be effectively applied to secure multi-party computing among multi-users in a cloud computing environment, and has excellent characteristics such as confidentiality, ciphertext availability, anti-collusion attack, and anti-quantum attack. Compared with the BGV type multi-key ful...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention specifically relates to an efficient BGV-type multi-key fully homomorphic encryption method, comprising: performing BGV-type homomorphic encryption on the plaintext of a user participating in the operation to obtain the ciphertext corresponding to the user; The ciphertext is expanded to obtain the extended ciphertext of the corresponding user set; the homomorphic operation is performed on the extended ciphertext of the user set participating in the operation to obtain a high-dimensional BGV ciphertext, and the BGV synchronization is performed on the keys of the users participating in the calculation. State encryption and GSW homomorphic encryption, and perform ciphertext expansion and mixed homomorphic multiplication on the encrypted result to obtain the calculation key, and reduce the dimensionality of the high-dimensional BGV ciphertext through the calculation key; The ciphertext runs the modulus function to reduce the noise in the ciphertext, and finally outputs the final ciphertext result of the homomorphic operation. The BGV-type multi-key fully homomorphic encryption method can allow homomorphic operations between ciphertexts of users with different keys, thereby realizing a secure multi-party computing function.

Description

technical field [0001] The invention belongs to the field of information security and privacy protection, and in particular relates to an efficient BGV type multi-key fully homomorphic encryption method. Background technique [0002] Fully homomorphic encryption (Full-homomorphic encryption, FHE) can perform arbitrary calculations on ciphertexts when the key is unknown. It has the property of exchanging encryption and operations, and has a high theoretical and application level in the current cloud computing environment. Value, can be widely used in ciphertext retrieval, secure multi-party computing, cloud data analysis, etc. Since Gentry proposed the first ideal lattice-based fully homomorphic encryption scheme Gen09 in 2009, based on Gentry's blueprint for fully homomorphic encryption, more and more fully homomorphic encryption schemes (DGHV10, BV11a, BV11b, BGV12 , GSW13, AP14, etc.) were proposed. [0003] Multi-key fully homomorphic encryption (multi-key FHE, MKFHE) a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 李宁波周潭平杨晓元魏立线韩益亮刘龙飞吴立强刘文超涂广升
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products